Headline
RHSA-2023:5628: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-1095: A NULL pointer dereference flaw was found in the Linux kernel’s netfilter subsystem. The issue could occur due to an error in nf_tables_updtable while freeing a transaction object not placed on the list head. This flaw allows a local, unprivileged user to crash the system, resulting in a denial of service.
- CVE-2023-1637: A flaw was found in the Linux kernel X86 CPU Power management when resuming CPU from suspend-to-RAM. This issue could allow a local user unauthorized access to memory from the CPU.
- CVE-2023-3609: A double-free flaw was found in u32_set_parms in net/sched/cls_u32.c in the Network Scheduler component in the Linux kernel. This flaw allows a local attacker to use a failure event to mishandle the reference counter, leading to a local privilege escalation threat.
- CVE-2023-3776: A use-after-free vulnerability was found in fw_set_parms in net/sched/cls_fw.c in network scheduler sub-component in the Linux Kernel. This issue occurs due to a missing sanity check during cleanup at the time of failure, leading to a misleading reference. This may allow a local attacker to gain local privilege escalation.
- CVE-2023-4128: A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails (CVE-2023-3609)
- kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776)
- kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128)
- kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head (CVE-2023-1095)
- kernel: save/restore speculative MSRs during S3 suspend/resume (CVE-2023-1637)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- avoid unnecessary page fault retires on shared memory types (BZ#2221102)
- [Hyper-V][RHEL-8] Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2227261)
- kernel-devel RPM cross-compiled by CKI contains host-arch scripts (BZ#2232139)
- iavf: hang in iavf_remove() - SNO node hangs after running systemctl reboot (BZ#2232405)
- netfilter: RHEL 8.8 phase 2 backports from upstream (BZ#2236818)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
Fixes
- BZ - 2173973 - CVE-2023-1095 kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head
- BZ - 2181891 - CVE-2023-1637 kernel: save/restore speculative MSRs during S3 suspend/resume
- BZ - 2225097 - CVE-2023-3776 kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function
- BZ - 2225201 - CVE-2023-3609 kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails
- BZ - 2225511 - CVE-2023-4128 kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
CVEs
- CVE-2023-1095
- CVE-2023-1637
- CVE-2023-3609
- CVE-2023-3776
- CVE-2023-4128
Red Hat Enterprise Linux Server - AUS 8.4
SRPM
kernel-4.18.0-305.108.1.el8_4.src.rpm
SHA-256: 3f74b6721f4e6a8a342ece298c45b7dbb5bcd160efee7ab8c6c446df96a355e8
x86_64
bpftool-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: fd7eaebcce393e13bad18a496c27ceff2e71f93772b26fc4e9f0dc75b9265c7a
bpftool-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 2e558a59da66f002e49bbcb7193338f836f43872c9a1e1beffa01e5e073b1fda
kernel-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 2200038364fb4b37f6b042bfdb7c365b152d424166510eb0fea35e7943590a6d
kernel-abi-stablelists-4.18.0-305.108.1.el8_4.noarch.rpm
SHA-256: 94b5de4bfd4a6a6b6823e01d4ab485079a5756ef982357f20a72575a5cb0d0e6
kernel-core-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: ca5f58720dc7060eb0f85120e326525ddc9246429fda26b0d47d1f799a93f732
kernel-cross-headers-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 1b36987601e4cd7b50f5fa1cdae099ff707b831b68ab9685db13f19e28b80719
kernel-debug-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 6d789ad5f62bb9349be9fba4ec54c651a619effcef419f24979e7cf19c6e7747
kernel-debug-core-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: dd1d7b5489f43addc05664f1c74cac45b48fc3cd8f9dc81fd2023ffc0e484b80
kernel-debug-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 8f2b5130f9235e437213bc56abbf48f7d1ba5646d2598a6a0faa8300ac625b17
kernel-debug-devel-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: c9a462784327c26a82b80635f6201075527a901f6634cab25ca9dae036ce4e6d
kernel-debug-modules-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 4647cfb222d7fc992f8e9b8a97350c3715cc39b52e634943a325ef47d169f155
kernel-debug-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: b1fe821f5524589ab326b9f3029c457a9e824932d304b6de010a7108f908455e
kernel-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 67772c4f45a5f32a7d00069438f9b42f46e35ef9f7b3e5b62adac3e0754f3c6f
kernel-debuginfo-common-x86_64-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 720a4b4b5da41c743b10c8a6c31d40c1d5cf517ad9fcd2de23a4978b78a1ab65
kernel-devel-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 7e6f64429d354b5a932bb555aafad7ba32364e1fb470f5558271459cf448a4f7
kernel-doc-4.18.0-305.108.1.el8_4.noarch.rpm
SHA-256: 4f49cbc33b72337289aea9c34837a64f0172f19d068c9355b663b2ec8a6f940f
kernel-headers-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 57c00903d13425746ec8b93108784de30052fde2e3423bf65b9c518e90bb95ca
kernel-modules-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 3566be1c5545bf55519714c3f7912cf372617185330bb8653a9ab02018f7f2f9
kernel-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 13e586ff72b623ad79cab35fb5ae78243e8274a33d373072fdd5f89beffbe2d2
kernel-tools-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: c29bb68db78e8af424106bb28d0707b985ba2278b9a56ad4bc47cfdef602ceef
kernel-tools-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: b6a042e045f75daa94bed22d95941bd454305e1543cf008af273a8f4d94a37f0
kernel-tools-libs-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 959f230c1fa67c8092a64ea0abf960f45839342eb0ed53ba8882b6262a98b9b4
perf-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 4f6e73b4b9b6aadf988ce70f05075ce270f7870ddcbb083723b3eb1ada62a006
perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: dc7127f211533a7c15de5b58da13d3c78db63e08cd6d5269cdb2ba7f270d6e5e
python3-perf-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 7253996e612bff40e317506c741c9c8e2867fbf0d1b4a867ccc50486af1f5fd0
python3-perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 7cbc0365282c0abdcc95a8d9af6292a8208c7257d3b55d70c12e6751c6a76991
Red Hat Enterprise Linux Server - TUS 8.4
SRPM
kernel-4.18.0-305.108.1.el8_4.src.rpm
SHA-256: 3f74b6721f4e6a8a342ece298c45b7dbb5bcd160efee7ab8c6c446df96a355e8
x86_64
bpftool-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: fd7eaebcce393e13bad18a496c27ceff2e71f93772b26fc4e9f0dc75b9265c7a
bpftool-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 2e558a59da66f002e49bbcb7193338f836f43872c9a1e1beffa01e5e073b1fda
kernel-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 2200038364fb4b37f6b042bfdb7c365b152d424166510eb0fea35e7943590a6d
kernel-abi-stablelists-4.18.0-305.108.1.el8_4.noarch.rpm
SHA-256: 94b5de4bfd4a6a6b6823e01d4ab485079a5756ef982357f20a72575a5cb0d0e6
kernel-core-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: ca5f58720dc7060eb0f85120e326525ddc9246429fda26b0d47d1f799a93f732
kernel-cross-headers-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 1b36987601e4cd7b50f5fa1cdae099ff707b831b68ab9685db13f19e28b80719
kernel-debug-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 6d789ad5f62bb9349be9fba4ec54c651a619effcef419f24979e7cf19c6e7747
kernel-debug-core-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: dd1d7b5489f43addc05664f1c74cac45b48fc3cd8f9dc81fd2023ffc0e484b80
kernel-debug-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 8f2b5130f9235e437213bc56abbf48f7d1ba5646d2598a6a0faa8300ac625b17
kernel-debug-devel-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: c9a462784327c26a82b80635f6201075527a901f6634cab25ca9dae036ce4e6d
kernel-debug-modules-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 4647cfb222d7fc992f8e9b8a97350c3715cc39b52e634943a325ef47d169f155
kernel-debug-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: b1fe821f5524589ab326b9f3029c457a9e824932d304b6de010a7108f908455e
kernel-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 67772c4f45a5f32a7d00069438f9b42f46e35ef9f7b3e5b62adac3e0754f3c6f
kernel-debuginfo-common-x86_64-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 720a4b4b5da41c743b10c8a6c31d40c1d5cf517ad9fcd2de23a4978b78a1ab65
kernel-devel-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 7e6f64429d354b5a932bb555aafad7ba32364e1fb470f5558271459cf448a4f7
kernel-doc-4.18.0-305.108.1.el8_4.noarch.rpm
SHA-256: 4f49cbc33b72337289aea9c34837a64f0172f19d068c9355b663b2ec8a6f940f
kernel-headers-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 57c00903d13425746ec8b93108784de30052fde2e3423bf65b9c518e90bb95ca
kernel-modules-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 3566be1c5545bf55519714c3f7912cf372617185330bb8653a9ab02018f7f2f9
kernel-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 13e586ff72b623ad79cab35fb5ae78243e8274a33d373072fdd5f89beffbe2d2
kernel-tools-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: c29bb68db78e8af424106bb28d0707b985ba2278b9a56ad4bc47cfdef602ceef
kernel-tools-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: b6a042e045f75daa94bed22d95941bd454305e1543cf008af273a8f4d94a37f0
kernel-tools-libs-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 959f230c1fa67c8092a64ea0abf960f45839342eb0ed53ba8882b6262a98b9b4
perf-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 4f6e73b4b9b6aadf988ce70f05075ce270f7870ddcbb083723b3eb1ada62a006
perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: dc7127f211533a7c15de5b58da13d3c78db63e08cd6d5269cdb2ba7f270d6e5e
python3-perf-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 7253996e612bff40e317506c741c9c8e2867fbf0d1b4a867ccc50486af1f5fd0
python3-perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 7cbc0365282c0abdcc95a8d9af6292a8208c7257d3b55d70c12e6751c6a76991
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.108.1.el8_4.src.rpm
SHA-256: 3f74b6721f4e6a8a342ece298c45b7dbb5bcd160efee7ab8c6c446df96a355e8
ppc64le
bpftool-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 7a29d84e95b7955aba6d5b327a03198e746166728f4af7b8f5baa640fd225cb9
bpftool-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: cf8b7e66debd770c0bc9f4183a9744d7282f2ece916b6875d2683b4fc680c309
kernel-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 9b4114998c326d00084d7b5f06483110b4859bdea52d1ab3eb462c1a1c2f23dc
kernel-abi-stablelists-4.18.0-305.108.1.el8_4.noarch.rpm
SHA-256: 94b5de4bfd4a6a6b6823e01d4ab485079a5756ef982357f20a72575a5cb0d0e6
kernel-core-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 1d6fa6fe386af2269a164b339449d5da8d99ac684dbf5b412655da50a1626b9e
kernel-cross-headers-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: a242541cf1e01fc397a74eb5f9dad1991fcf4ee1e112166ad27ec16a06fff45f
kernel-debug-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: a909fc5a7b355d674703ddb0b57773561792bc1a5b82b4ded0a253ceca4aafb0
kernel-debug-core-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 88c7300d858038da57c532670ec919adda3e2f2469bcf290a6ea606ae87d2d5e
kernel-debug-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 1213ea9c35351a430a27a7fd347f5f2a844858fe81dbe77d939d76b7f8de49ab
kernel-debug-devel-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 8530afc084e36545c8f536317055e8d5d801dbda7a7ae79e2cacb380874b0caa
kernel-debug-modules-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 2d5d636e829578f392e8589a3ab7ffe6b974e08c4ed136c70055ad483827b814
kernel-debug-modules-extra-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 90a5b6537d34d442da4f4f79920cfa1cdf9483ad3ae051207399d325f66481f5
kernel-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 7d1ca28dd9da6750953081e9b094162be516f988c5307a18e34c685c43c42c2f
kernel-debuginfo-common-ppc64le-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 28d064ac655b19d766d3e80de7851e2b49a8e30266878e27973518e3b83eb6ae
kernel-devel-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 8c923e00a3f7ff39906faeb1610031215bdd0e2aaf752aa4da757601ff1e856e
kernel-doc-4.18.0-305.108.1.el8_4.noarch.rpm
SHA-256: 4f49cbc33b72337289aea9c34837a64f0172f19d068c9355b663b2ec8a6f940f
kernel-headers-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: f91e7d88bf67d765679cf9a4dbc51775a42d8397fcd540ae1c01dffa95c0c3d3
kernel-modules-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: d7bd87aea1f21ad299672ead01c409a54a36376c02476531e05488971dc7551e
kernel-modules-extra-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: a59b1f6cf19e694e47746ec627ad892209c83a5f26d8d4e88aebd4869139e36f
kernel-tools-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 89372a24aadc4ad68e353e29129b9f335b35182c80204c3326a8dac3cd78bdcd
kernel-tools-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 8e31a250dd291000919ee47c30e3ced3ac17734dd22d6e91ca1feb391af79fb6
kernel-tools-libs-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: ac4e20051f8d3af8a240f0aa2b61a4a4ed17bdf10582a4e4235b00379beea407
perf-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 6dafe89e4417480caafa4d265f011e655d1ab801a761350a685e7e7bfd6997eb
perf-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: 28a25ad81122647c5bfec9cb0e99fae15b29e1404451f80c3da0b23a2b8272e7
python3-perf-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: b112fe78c30c255e499cbd2a39a7b18558334233676ecd5441390af3652893cd
python3-perf-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm
SHA-256: a6bae502c020dff3e907d923ac922ff949d2291d2c1f42492d7bda65932ab4e4
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.108.1.el8_4.src.rpm
SHA-256: 3f74b6721f4e6a8a342ece298c45b7dbb5bcd160efee7ab8c6c446df96a355e8
x86_64
bpftool-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: fd7eaebcce393e13bad18a496c27ceff2e71f93772b26fc4e9f0dc75b9265c7a
bpftool-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 2e558a59da66f002e49bbcb7193338f836f43872c9a1e1beffa01e5e073b1fda
kernel-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 2200038364fb4b37f6b042bfdb7c365b152d424166510eb0fea35e7943590a6d
kernel-abi-stablelists-4.18.0-305.108.1.el8_4.noarch.rpm
SHA-256: 94b5de4bfd4a6a6b6823e01d4ab485079a5756ef982357f20a72575a5cb0d0e6
kernel-core-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: ca5f58720dc7060eb0f85120e326525ddc9246429fda26b0d47d1f799a93f732
kernel-cross-headers-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 1b36987601e4cd7b50f5fa1cdae099ff707b831b68ab9685db13f19e28b80719
kernel-debug-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 6d789ad5f62bb9349be9fba4ec54c651a619effcef419f24979e7cf19c6e7747
kernel-debug-core-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: dd1d7b5489f43addc05664f1c74cac45b48fc3cd8f9dc81fd2023ffc0e484b80
kernel-debug-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 8f2b5130f9235e437213bc56abbf48f7d1ba5646d2598a6a0faa8300ac625b17
kernel-debug-devel-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: c9a462784327c26a82b80635f6201075527a901f6634cab25ca9dae036ce4e6d
kernel-debug-modules-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 4647cfb222d7fc992f8e9b8a97350c3715cc39b52e634943a325ef47d169f155
kernel-debug-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: b1fe821f5524589ab326b9f3029c457a9e824932d304b6de010a7108f908455e
kernel-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 67772c4f45a5f32a7d00069438f9b42f46e35ef9f7b3e5b62adac3e0754f3c6f
kernel-debuginfo-common-x86_64-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 720a4b4b5da41c743b10c8a6c31d40c1d5cf517ad9fcd2de23a4978b78a1ab65
kernel-devel-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 7e6f64429d354b5a932bb555aafad7ba32364e1fb470f5558271459cf448a4f7
kernel-doc-4.18.0-305.108.1.el8_4.noarch.rpm
SHA-256: 4f49cbc33b72337289aea9c34837a64f0172f19d068c9355b663b2ec8a6f940f
kernel-headers-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 57c00903d13425746ec8b93108784de30052fde2e3423bf65b9c518e90bb95ca
kernel-modules-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 3566be1c5545bf55519714c3f7912cf372617185330bb8653a9ab02018f7f2f9
kernel-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 13e586ff72b623ad79cab35fb5ae78243e8274a33d373072fdd5f89beffbe2d2
kernel-tools-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: c29bb68db78e8af424106bb28d0707b985ba2278b9a56ad4bc47cfdef602ceef
kernel-tools-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: b6a042e045f75daa94bed22d95941bd454305e1543cf008af273a8f4d94a37f0
kernel-tools-libs-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 959f230c1fa67c8092a64ea0abf960f45839342eb0ed53ba8882b6262a98b9b4
perf-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 4f6e73b4b9b6aadf988ce70f05075ce270f7870ddcbb083723b3eb1ada62a006
perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: dc7127f211533a7c15de5b58da13d3c78db63e08cd6d5269cdb2ba7f270d6e5e
python3-perf-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 7253996e612bff40e317506c741c9c8e2867fbf0d1b4a867ccc50486af1f5fd0
python3-perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm
SHA-256: 7cbc0365282c0abdcc95a8d9af6292a8208c7257d3b55d70c12e6751c6a76991
Related news
Red Hat Security Advisory 2024-1253-03 - An update for kpatch-patch-5_14_0-70_64_1, kpatch-patch-5_14_0-70_70_1, kpatch-patch-5_14_0-70_75_1, kpatch-patch-5_14_0-70_80_1, and kpatch-patch-5_14_0-70_85_1 is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2024-0261-03 - An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-7539-01 - An update for kernel is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-7434-01 - An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-7419-01 - An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-7418-01 - An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-7077-01 - An update for kernel is now available for Red Hat Enterprise Linux 8. Issues addressed include buffer overflow, denial of service, double free, information leakage, memory leak, null pointer, out of bounds access, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5794-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
Vulnerability in the Sun ZFS Storage Appliance product of Oracle Systems (component: Core). The supported version that is affected is 8.8.60. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). Various other issues were also addressed.
Red Hat Security Advisory 2023-5628-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5627-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass, null pointer, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5603-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include denial of service, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5589-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include double free and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3609: A double-free flaw was found in u32_set_parms in net/sched/cls_u32.c in the Network Scheduler component in the Linux kernel. This flaw allows a local attacker to use a failure event to mishandle the reference counter, leading to a local privilege escalation threat. * CVE-2023-32233: A use-after-free vulnerability was found in the Netfilter subs...
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_co...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-4128: A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue. * CVE-2023-31248: A use-af...
Ubuntu Security Notice 6386-3 - Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle L2CAP socket release, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 6387-2 - Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle L2CAP socket release, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 6397-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service.
Ubuntu Security Notice 6386-1 - Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle L2CAP socket release, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 6387-1 - Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle L2CAP socket release, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2023-5233-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.4 images.
Red Hat Security Advisory 2023-5235-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-5238-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.
Ubuntu Security Notice 6383-1 - Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. It was discovered that the ARM64 KVM implementation in the Linux kernel did not properly restrict hypervisor memory access. An attacker in a guest VM could use this to execute arbitrary code in the host OS.
Red Hat Security Advisory 2023-5255-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine- tuning for systems with extremely high determinism requirements. Issues addressed include information leakage, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5221-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can lead to performing arbitrary reads and writes in kernel memory. This flaw allows a local user with CAP_NET_ADMIN capability to crash or potentially escalate t...
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can lead to performing arbitrary reads and writes in kernel memory. This flaw allows a local user with CAP_NET_ADMIN capability to crash or potentially escalate their p...
Red Hat OpenShift Virtualization release 4.13.4 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.
Red Hat Security Advisory 2023-5069-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5069-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5091-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can lead to performing arbitrary reads and writes in kernel memory. This flaw allows a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system. * CVE...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1637: A flaw was found in the Linux kernel X86 CPU Power management when resuming CPU from suspend-to-RAM. This issue could allow a local user unauthorized access to memory from the CPU. * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can...
Ubuntu Security Notice 6342-1 - Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information. Zheng Zhang discovered that the device-mapper implementation in the Linux kernel did not properly handle locking during table_clear operations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 6341-1 - Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the do_prlimit function in the Linux kernel did not properly handle speculative execution barriers. A local attacker could use this to expose sensitive information. It was discovered that a use-after-free vulnerability existed in the IEEE 1394 implementation in the Linux kernel. A privileged attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 6332-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 6331-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.
Ubuntu Security Notice 6329-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6328-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6327-1 - Zheng Zhang discovered that the device-mapper implementation in the Linux kernel did not properly handle locking during table_clear operations. A local attacker could use this to cause a denial of service. It was discovered that a use-after-free vulnerability existed in the HFS+ file system implementation in the Linux kernel. A local attacker could possibly use this to cause a denial of service.
Ubuntu Security Notice 6325-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6317-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6318-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6318-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6315-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6309-1 - Zheng Zhang discovered that the device-mapper implementation in the Linux kernel did not properly handle locking during table_clear operations. A local attacker could use this to cause a denial of service. It was discovered that a use-after-free vulnerability existed in the HFS+ file system implementation in the Linux kernel. A local attacker could possibly use this to cause a denial of service.
A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.
Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.
Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.
Ubuntu Security Notice 6031-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the Integrity Measurement Architecture implementation in the Linux kernel did not properly enforce policy in certain conditions. A privileged attacker could use this to bypass Kernel lockdown restrictions.
Ubuntu Security Notice 6014-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 6013-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 6001-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.
In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.